City: Bucharest
Region: Bucuresti
Country: Romania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '194.150.84.0 - 194.150.87.255'
% Abuse contact for '194.150.84.0 - 194.150.87.255' is 'abuse@tennet.ro'
inetnum: 194.150.84.0 - 194.150.87.255
netname: TENNET-NET
country: RO
org: ORG-TLS5-RIPE
admin-c: MG21773-RIPE
tech-c: CP3708-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: TENNETLINK-MNT
mnt-routes: TENNETLINK-MNT
mnt-domains: TENNETLINK-MNT
created: 2006-09-01T10:14:47Z
last-modified: 2016-04-14T08:44:57Z
source: RIPE
sponsoring-org: ORG-ETS1-RIPE
organisation: ORG-TLS5-RIPE
org-name: TENNET LINK SRL
country: RO
org-type: OTHER
address: Str. Grivita Nr.395, Bl.M2, Sc. C, Et. 5, Ap.17
admin-c: MG21773-RIPE
tech-c: CF3992-RIPE
abuse-c: AR34741-RIPE
mnt-ref: TENNETLINK-MNT
mnt-by: TENNETLINK-MNT
created: 2015-12-17T19:37:48Z
last-modified: 2022-12-01T16:55:43Z
source: RIPE # Filtered
person: Cristian Predesel
address: Bd. Bucurestii Noi, Bucharest, RO
phone: +40-722-137621
remarks: ------------------------------------------------
remarks: | Please do not send me any abuse complaints. |
remarks: | Use abuse@thorpanel.com for that or contact |
remarks: | your service provider or local authorities |
remarks: | ! DO NOT CALL ME REGARDING ABUSE ISSUES ! |
remarks: | Please do not make an abuse yourself by |
remarks: | disregarding this request ! |
remarks: | I WILL NOT HELP YOU WITH YOUR PROBLEM ! |
remarks: ------------------------------------------------
nic-hdl: CP3708-RIPE
mnt-by: GCN-MNT
created: 2006-08-30T08:43:20Z
last-modified: 2017-10-30T21:51:02Z
source: RIPE # Filtered
person: Macri Georgiana
address: Bucuresti,Romania
phone: +40-731123100
nic-hdl: MG21773-RIPE
mnt-by: TENNETLINK-MNT
created: 2015-12-17T19:29:29Z
last-modified: 2015-12-17T19:29:29Z
source: RIPE
% Information related to '194.150.84.0/24AS39543'
route: 194.150.84.0/24
descr: TENNET TELECOM
origin: AS39543
mnt-by: TENNET-MNT
created: 2023-09-25T11:33:28Z
last-modified: 2023-09-25T11:33:28Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.150.84.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.150.84.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032800 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 21:47:38 CST 2026
;; MSG SIZE rcvd: 107
Host 242.84.150.194.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.84.150.194.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.220.101.0 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.0 user=root Failed password for root from 185.220.101.0 port 43617 ssh2 Failed password for root from 185.220.101.0 port 43617 ssh2 Failed password for root from 185.220.101.0 port 43617 ssh2 Failed password for root from 185.220.101.0 port 43617 ssh2 |
2019-06-22 19:34:52 |
| 128.106.251.174 | attackspam | Telnetd brute force attack detected by fail2ban |
2019-06-22 19:23:15 |
| 218.92.0.172 | attackspambots | ssh-bruteforce |
2019-06-22 19:19:04 |
| 36.68.4.236 | attackbotsspam | Jun 22 13:40:08 nginx sshd[24923]: Invalid user user1 from 36.68.4.236 Jun 22 13:40:08 nginx sshd[24923]: Received disconnect from 36.68.4.236 port 25837:11: Bye Bye [preauth] |
2019-06-22 19:40:19 |
| 153.3.122.159 | attackbots | Jun 22 06:46:16 apollo sshd\[28035\]: Failed password for root from 153.3.122.159 port 48878 ssh2Jun 22 06:46:18 apollo sshd\[28035\]: Failed password for root from 153.3.122.159 port 48878 ssh2Jun 22 06:46:21 apollo sshd\[28035\]: Failed password for root from 153.3.122.159 port 48878 ssh2 ... |
2019-06-22 19:09:28 |
| 180.250.18.20 | attackspam | Jun 22 06:21:49 pornomens sshd\[3452\]: Invalid user jenkins from 180.250.18.20 port 47631 Jun 22 06:21:49 pornomens sshd\[3452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.18.20 Jun 22 06:21:51 pornomens sshd\[3452\]: Failed password for invalid user jenkins from 180.250.18.20 port 47631 ssh2 ... |
2019-06-22 19:36:03 |
| 185.173.35.37 | attackspam | firewall-block, port(s): 873/tcp |
2019-06-22 19:47:02 |
| 185.220.102.8 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.8 user=root Failed password for root from 185.220.102.8 port 36417 ssh2 Failed password for root from 185.220.102.8 port 36417 ssh2 Failed password for root from 185.220.102.8 port 36417 ssh2 Failed password for root from 185.220.102.8 port 36417 ssh2 |
2019-06-22 19:39:22 |
| 143.215.172.79 | attackbots | Port scan on 1 port(s): 53 |
2019-06-22 19:00:12 |
| 112.85.42.189 | attack | Jun 22 07:17:52 mail sshd\[27793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189 user=root Jun 22 07:17:54 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2 Jun 22 07:17:56 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2 Jun 22 07:17:58 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2 Jun 22 07:18:44 mail sshd\[27903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189 user=root |
2019-06-22 19:49:39 |
| 157.230.163.6 | attackbotsspam | $f2bV_matches |
2019-06-22 19:02:53 |
| 197.51.201.16 | attack | Automatic report - Web App Attack |
2019-06-22 19:45:53 |
| 40.77.167.17 | attackspam | SQL Injection |
2019-06-22 19:08:29 |
| 36.79.254.155 | attackspambots | TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:21:19] |
2019-06-22 19:25:59 |
| 52.160.192.165 | attack | Jun 22 00:24:06 localhost kernel: [12421639.493846] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=13517 PROTO=UDP SPT=30219 DPT=111 LEN=48 Jun 22 00:24:06 localhost kernel: [12421639.493875] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=13517 PROTO=UDP SPT=30219 DPT=111 LEN=48 Jun 22 00:24:18 localhost kernel: [12421652.071158] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=23253 PROTO=UDP SPT=30219 DPT=111 LEN=48 Jun 22 00:24:18 localhost kernel: [12421652.071182] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=23253 PROTO=UDP SPT=30219 DPT=111 LEN=48 |
2019-06-22 18:55:20 |